default search action
Yulei Sui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Yao Wan, Zhangqian Bi, Yang He, Jianguo Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin, Philip S. Yu:
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit. ACM Comput. Surv. 56(12): 309:1-309:41 (2024) - [j46]Fangyun Qin, Zheng Zheng, Yulei Sui, Siqian Gong, Zhi-Ping Shi, Kishor S. Trivedi:
Cross-project concurrency bug prediction using domain-adversarial neural network. J. Syst. Softw. 214: 112077 (2024) - [j45]Jianfei Zhu, Guanping Xiao, Zheng Zheng, Yulei Sui:
Deep semi-supervised learning for recovering traceability links between issues and commits. J. Syst. Softw. 216: 112109 (2024) - [j44]Yang Wu, Yao Wan, Hongyu Zhang, Yulei Sui, Wucai Wei, Wei Zhao, Guandong Xu, Hai Jin:
Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study. Proc. ACM Manag. Data 2(3): 115 (2024) - [j43]Pei Xu, Yuxiang Lei, Yulei Sui, Jingling Xue:
Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability. Proc. ACM Program. Lang. 8(OOPSLA1): 1437-1462 (2024) - [j42]Yuxiang Lei, Camille Bossut, Yulei Sui, Qirun Zhang:
Context-Free Language Reachability via Skewed Tabulation. Proc. ACM Program. Lang. 8(PLDI): 1830-1853 (2024) - [j41]Xiao Cheng, Jiawei Ren, Yulei Sui:
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point Slicing. Proc. ACM Softw. Eng. 1(FSE): 494-516 (2024) - [j40]Changwei Zou, Dongjie He, Yulei Sui, Jingling Xue:
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers. Proc. ACM Softw. Eng. 1(FSE): 1609-1631 (2024) - [j39]Weigang He, Peng Di, Mengli Ming, Chengyu Zhang, Ting Su, Shijie Li, Yulei Sui:
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles. Proc. ACM Softw. Eng. 1(FSE): 1656-1678 (2024) - [j38]Xiao Cheng, Xu Nie, Ningke Li, Haoyu Wang, Zheng Zheng, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. IEEE Trans. Dependable Secur. Comput. 21(2): 542-558 (2024) - [j37]Mengxi Jiang, Yulei Sui, Yunqi Lei, Xiaofei Xie, Cuihua Li, Yang Liu, Ivor W. Tsang:
Adversarial Learning for Coordinate Regression Through $k$k-Layer Penetrating Representation. IEEE Trans. Dependable Secur. Comput. 21(6): 5538-5552 (2024) - [j36]Zhe Chen, Rui Yan, Yingzi Ma, Yulei Sui, Jingling Xue:
A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety. ACM Trans. Softw. Eng. Methodol. 33(4): 89:1-89:47 (2024) - [j35]Jiawei Ren, Yulei Sui, Xiao Cheng, Yuan Feng, Jianjun Zhao:
Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search. ACM Trans. Softw. Eng. Methodol. 33(5): 119:1-119:29 (2024) - [j34]Shuangxiang Kan, Yuhao Gao, Zexin Zhong, Yulei Sui:
Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java. IEEE Trans. Software Eng. 50(6): 1518-1533 (2024) - [j33]Chenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li, Jingling Xue:
Pearl: A Multi-Derivation Approach to Efficient CFL-Reachability Solving. IEEE Trans. Software Eng. 50(9): 2379-2397 (2024) - [c75]Zhangqian Bi, Yao Wan, Zheng Wang, Hongyu Zhang, Batu Guan, Fangxin Lu, Zili Zhang, Yulei Sui, Hai Jin, Xuanhua Shi:
Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback. ACL (Findings) 2024: 2336-2353 - [c74]Wei Zhao, Zhitao Hou, Siyuan Wu, Yang Gao, Haoyu Dong, Yao Wan, Hongyu Zhang, Yulei Sui, Haidong Zhang:
NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries. EACL (Findings) 2024: 2377-2388 - [c73]Xiao Cheng, Jiawei Wang, Yulei Sui:
Precise Sparse Abstract Execution via Cross-Domain Interaction. ICSE 2024: 109:1-109:12 - [c72]Dinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu, Yulei Sui, Pinjia He, Michael R. Lyu:
An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles. ICSE 2024: 210:1-210:13 - [c71]Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin:
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation. ISSTA 2024: 389-401 - [e2]Aviral Shrivastava, Yulei Sui:
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems, LCTES 2024, Copenhagen, Denmark, 24 June 2024. ACM 2024 [contents] - [i17]Yao Wan, Yang He, Zhangqian Bi, Jianguo Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin, Philip S. Yu:
Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit. CoRR abs/2401.00288 (2024) - [i16]Wei Zhao, Zhitao Hou, Siyuan Wu, Yan Gao, Haoyu Dong, Yao Wan, Hongyu Zhang, Yulei Sui, Haidong Zhang:
NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries. CoRR abs/2402.14853 (2024) - [i15]Zhangqian Bi, Yao Wan, Zheng Wang, Hongyu Zhang, Batu Guan, Fangxin Lu, Zili Zhang, Yulei Sui, Xuanhua Shi, Hai Jin:
Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback. CoRR abs/2403.16792 (2024) - [i14]Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin:
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation. CoRR abs/2404.15687 (2024) - [i13]Yang Wu, Yao Wan, Hongyu Zhang, Yulei Sui, Wucai Wei, Wei Zhao, Guandong Xu, Hai Jin:
Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study. CoRR abs/2404.17136 (2024) - 2023
- [j32]Yunjiao Lei, Dayong Ye, Sheng Shen, Yulei Sui, Tianqing Zhu, Wanlei Zhou:
New challenges in reinforcement learning: a survey of security and privacy. Artif. Intell. Rev. 56(7): 7195-7236 (2023) - [j31]Guanqin Zhang, Jiankun Sun, Feng Xu, Yulei Sui, H. M. N. Dilum Bandara, Shiping Chen, Tim Menzies:
A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning. IEEE Internet Comput. 27(6): 13-20 (2023) - [j30]Hsu Myat Win, Shin Hwei Tan, Yulei Sui:
Event-aware precise dynamic slicing for automatic debugging of Android applications. J. Syst. Softw. 198: 111606 (2023) - [j29]Xiaoxue Wu, Jinjin Shen, Wei Zheng, Lidan Lin, Yulei Sui, Abubakar Omari Abdallah Semasaba:
RNNtcs: A test case selection method for Recurrent Neural Networks. Knowl. Based Syst. 279: 110955 (2023) - [j28]Dongjie He, Yujiang Gui, Wei Li, Yonggang Tao, Changwei Zou, Yulei Sui, Jingling Xue:
A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis. Proc. ACM Program. Lang. 7(OOPSLA2): 971-1000 (2023) - [j27]Yuxiang Lei, Yulei Sui, Shin Hwei Tan, Qirun Zhang:
Recursive State Machine Guided Graph Folding for Context-Free Language Reachability. Proc. ACM Program. Lang. 7(PLDI): 318-342 (2023) - [j26]Jing Li, Yuangang Pan, Yueming Lyu, Yinghua Yao, Yulei Sui, Ivor W. Tsang:
Earning Extra Performance From Restrictive Feedbacks. IEEE Trans. Pattern Anal. Mach. Intell. 45(10): 11753-11765 (2023) - [j25]Xiaoting Du, Yulei Sui, Zhihao Liu, Jun Ai:
An Empirical Study of Fault Triggers in Deep Learning Frameworks. IEEE Trans. Dependable Secur. Comput. 20(4): 2696-2712 (2023) - [j24]Weiwei Zhang, Shengjian Guo, Hongyu Zhang, Yulei Sui, Yinxing Xue, Yun Xu:
Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations. IEEE Trans. Software Eng. 49(5): 3052-3070 (2023) - [c70]Qianyu Feng, Yulei Sui, Hongyu Zhang:
Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment. EMNLP (Findings) 2023: 8876-8888 - [c69]Zexin Zhong, Jiangchao Liu, Diyu Wu, Peng Di, Yulei Sui, Alex X. Liu, John C. S. Lui:
Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services. ICSE-SEIP 2023: 110-121 - [c68]Huashan Lei, Shuai Zhang, Jun Wang, Guanping Xiao, Yepang Liu, Yulei Sui:
Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study. ISSRE 2023: 509-520 - [c67]Chenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li, Jingling Xue:
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis. ASE 2023: 624-636 - [c66]Jun Wang, Guanping Xiao, Shuai Zhang, Huashan Lei, Yepang Liu, Yulei Sui:
Compatibility Issues in Deep Learning Systems: Problems and Opportunities. ESEC/SIGSOFT FSE 2023: 476-488 - [c65]Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian:
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel. USENIX Security Symposium 2023: 4211-4228 - [i12]Yunjiao Lei, Dayong Ye, Sheng Shen, Yulei Sui, Tianqing Zhu, Wanlei Zhou:
New Challenges in Reinforcement Learning: A Survey of Security and Privacy. CoRR abs/2301.00188 (2023) - [i11]Jing Li, Yuangang Pan, Yueming Lyu, Yinghua Yao, Yulei Sui, Ivor W. Tsang:
Earning Extra Performance from Restrictive Feedbacks. CoRR abs/2304.14831 (2023) - 2022
- [j23]Thazin Win Win Aung, Yao Wan, Huan Huo, Yulei Sui:
Multi-triage: A multi-task learning framework for bug triage. J. Syst. Softw. 184: 111133 (2022) - [j22]Yuxiang Lei, Yulei Sui, Shuo Ding, Qirun Zhang:
Taming transitive redundancy for context-free language reachability. Proc. ACM Program. Lang. 6(OOPSLA2): 1556-1582 (2022) - [j21]Wenhua Wang, Yuqun Zhang, Yulei Sui, Yao Wan, Zhou Zhao, Jian Wu, Philip S. Yu, Guandong Xu:
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention. IEEE Trans. Software Eng. 48(2): 102-119 (2022) - [j20]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [c64]Tuo Li, Jia-Ju Bai, Yulei Sui, Shi-Min Hu:
Path-sensitive and alias-aware typestate analysis for detecting OS bugs. ASPLOS 2022: 859-872 - [c63]Yao Wan, Yang He, Zhangqian Bi, Jianguo Zhang, Yulei Sui, Hongyu Zhang, Kazuma Hashimoto, Hai Jin, Guandong Xu, Caiming Xiong, Philip S. Yu:
NaturalCC: An Open-Source Toolkit for Code Intelligence. ICSE-Companion 2022: 149-153 - [c62]Zexin Zhong, Jiangchao Liu, Diyu Wu, Peng Di, Yulei Sui, Alex X. Liu:
Field-Based Static Taint Analysis for Industrial Microservices. ICSE (SEIP) 2022: 149-150 - [c61]Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin:
What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code. ICSE 2022: 2377-2388 - [c60]Jianfei Zhu, Guanping Xiao, Zheng Zheng, Yulei Sui:
Enhancing Traceability Link Recovery with Unlabeled Data. ISSRE 2022: 446-457 - [c59]Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui:
Path-sensitive code embedding via contrastive learning for software vulnerability detection. ISSTA 2022: 519-531 - [c58]Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui:
MalWhiteout: Reducing Label Errors in Android Malware Detection. ASE 2022: 69:1-69:13 - [c57]Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, Yulei Sui:
Demystifying the underground ecosystem of account registration bots. ESEC/SIGSOFT FSE 2022: 897-909 - [c56]Yao Wan, Shijie Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Dezhong Yao, Hai Jin, Lichao Sun:
You see what I want you to see: poisoning vulnerabilities in neural code search. ESEC/SIGSOFT FSE 2022: 1233-1245 - [c55]Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin:
Cross-Language Binary-Source Code Matching with Intermediate Representations. SANER 2022: 601-612 - [i10]Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin:
Cross-Language Binary-Source Code Matching with Intermediate Representations. CoRR abs/2201.07420 (2022) - [i9]Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin:
What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code. CoRR abs/2202.06840 (2022) - [i8]Guanqin Zhang, Jiankun Sun, Feng Xu, H. M. N. Dilum Bandara, Shiping Chen, Yulei Sui, Tim Menzies:
A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning. CoRR abs/2211.10012 (2022) - 2021
- [j19]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j18]Wei Zheng, Ying Wu, Xiaoxue Wu, Chen Feng, Yulei Sui, Xiapu Luo, Yajin Zhou:
A survey of Intel SGX and its applications. Frontiers Comput. Sci. 15(3): 153808 (2021) - [j17]Mohamad Barbar, Yulei Sui:
Compacting points-to sets through object clustering. Proc. ACM Program. Lang. 5(OOPSLA): 1-27 (2021) - [j16]Xiao Cheng, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. ACM Trans. Softw. Eng. Methodol. 30(3): 38:1-38:33 (2021) - [j15]Wei Hua, Yulei Sui, Yao Wan, Guangzhong Liu, Guandong Xu:
FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks. IEEE Trans. Reliab. 70(1): 304-318 (2021) - [j14]Wei Zheng, Yuxing Xun, Xiaoxue Wu, Zhi Deng, Xiang Chen, Yulei Sui:
A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification. IEEE Trans. Reliab. 70(4): 1658-1670 (2021) - [c54]Jingfeng Zhang, Haiwen Hong, Yin Zhang, Yao Wan, Ye Liu, Yulei Sui:
Disentangled Code Representation Learning for Multiple Programming Languages. ACL/IJCNLP (Findings) 2021: 4454-4466 - [c53]Mohamad Barbar, Yulei Sui, Shiping Chen:
Object Versioning for Flow-Sensitive Pointer Analysis. CGO 2021: 222-235 - [c52]Haiwen Hong, Jingfeng Zhang, Yin Zhang, Yao Wan, Yulei Sui:
Fix-Filter-Fix: Intuitively Connect Any Models for Effective Bug Fixing. EMNLP (1) 2021: 3495-3504 - [c51]Guanping Xiao, Jun Liu, Zheng Zheng, Yulei Sui:
Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems. ISSRE 2021: 557-568 - [c50]Zhe Chen, Chong Wang, Junqi Yan, Yulei Sui, Jingling Xue:
Runtime detection of memory errors with smart status. ISSTA 2021: 296-308 - [c49]Mohamad Barbar, Yulei Sui:
Hash Consed Points-To Sets. SAS 2021: 25-48 - [c48]Dinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu, Yulei Sui:
An exploratory study of autopilot software bugs in unmanned aerial vehicles. ESEC/SIGSOFT FSE 2021: 20-31 - [i7]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i6]Weiwei Zhang, Shengjian Guo, Hongyu Zhang, Yulei Sui, Yinxing Xue, Yun Xu:
Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations. CoRR abs/2111.10793 (2021) - 2020
- [j13]Mohamad Barbar, Yulei Sui, Shiping Chen:
Flow-Sensitive Type-Based Heap Cloning (Artifact). Dagstuhl Artifacts Ser. 6(2): 01:1-01:2 (2020) - [j12]Mehdi Nobakht, Yulei Sui, Aruna Seneviratne, Wen Hu:
PGFit: Static permission analysis of health and fitness apps in IoT programming frameworks. J. Netw. Comput. Appl. 152 (2020) - [j11]Yulei Sui, Xiao Cheng, Guanqin Zhang, Haoyu Wang:
Flow2Vec: value-flow-based precise code embedding. Proc. ACM Program. Lang. 4(OOPSLA): 233:1-233:27 (2020) - [j10]Yanxin Zhang, Yulei Sui, Shirui Pan, Zheng Zheng, Baodi Ning, Ivor W. Tsang, Wanlei Zhou:
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning. IEEE Trans. Inf. Forensics Secur. 15: 3401-3414 (2020) - [j9]Jing Li, Yuangang Pan, Yulei Sui, Ivor W. Tsang:
Secure Metric Learning via Differential Pairwise Privacy. IEEE Trans. Inf. Forensics Secur. 15: 3640-3652 (2020) - [j8]Guanping Xiao, Zheng Zheng, Bo Jiang, Yulei Sui:
An Empirical Study of Regression Bug Chains in Linux. IEEE Trans. Reliab. 69(2): 558-570 (2020) - [j7]Yulei Sui, Jingling Xue:
Value-Flow-Based Demand-Driven Pointer Analysis for C and C++. IEEE Trans. Software Eng. 46(8): 812-835 (2020) - [c47]Yanxin Zhang, Guanping Xiao, Zheng Zheng, Tianqing Zhu, Ivor W. Tsang, Yulei Sui:
An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps. APSEC 2020: 41-50 - [c46]Mohamad Barbar, Yulei Sui, Shiping Chen:
Flow-Sensitive Type-Based Heap Cloning. ECOOP 2020: 24:1-24:26 - [c45]Yangyang Shu, Yulei Sui, Hongyu Zhang, Guandong Xu:
Perf-AL: Performance Prediction for Configurable Software through Adversarial Learning. ESEM 2020: 16:1-16:11 - [c44]Jiaming Ye, Mingliang Ma, Yun Lin, Yulei Sui, Yinxing Xue:
Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts. ICSE (Companion Volume) 2020: 274-275 - [c43]Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, Yulei Sui:
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. ICSE 2020: 999-1010 - [c42]Xiaoting Du, Guanping Xiao, Yulei Sui:
Fault Triggers in the TensorFlow Framework: An Experience Report. ISSRE 2020: 1-12 - [c41]Shuqing Li, Yechang Wu, Yi Liu, Dinghua Wang, Ming Wen, Yida Tao, Yulei Sui, Yepang Liu:
An Exploratory Study of Bugs in Extended Reality Applications on the Web. ISSRE 2020: 172-183 - [c40]Guanping Xiao, Xiaoting Du, Yulei Sui, Tao Yue:
HINDBR: Heterogeneous Information Network Based Duplicate Bug Report Prediction. ISSRE 2020: 195-206 - [c39]Thazin Win Win Aung, Huan Huo, Yulei Sui:
A Literature Review of Automatic Traceability Links Recovery for Software Change Impact Analysis. ICPC 2020: 14-24 - [c38]Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, Tianyong Peng:
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. ASE 2020: 1029-1040 - [c37]Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. ESEC/SIGSOFT FSE 2020: 914-926 - [c36]Wen Li, Haipeng Cai, Yulei Sui, David O. Manz:
PCA: memory leak detection using partial call-path analysis. ESEC/SIGSOFT FSE 2020: 1621-1625 - [c35]Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. USENIX Security Symposium 2020: 2325-2342 - [e1]Hakjoo Oh, Yulei Sui:
Proceedings of the 11th ACM SIGPLAN International Workshop on Tools for Automatic Program Analysis, TAPAS@SPLASH 2020, Virtual Event, USA, November 17, 2020. ACM 2020, ISBN 978-1-4503-8189-5 [contents] - [i5]Jing Li, Yuangang Pan, Yulei Sui, Ivor W. Tsang:
Secure Metric Learning via Differential Pairwise Privacy. CoRR abs/2003.13413 (2020) - [i4]Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. CoRR abs/2007.15943 (2020) - [i3]Yao Wan, Yang He, Jianguo Zhang, Yulei Sui, Hai Jin, Guandong Xu, Caiming Xiong, Philip S. Yu:
NaturalCC: A Toolkit to Naturalize the Source Code Corpus. CoRR abs/2012.03225 (2020)
2010 – 2019
- 2019
- [c34]Xiao Cheng, Haoyu Wang, Jiayi Hua, Miao Zhang, Guoai Xu, Li Yi, Yulei Sui:
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding. ICECCS 2019: 41-50 - [c33]Xuezheng Xu, Yulei Sui, Hua Yan, Jingling Xue:
VFix: value-flow-guided precise program repair for null pointer dereferences. ICSE 2019: 512-523 - [c32]Thazin Win Win Aung, Huan Huo, Yulei Sui:
Interactive Traceability Links Visualization using Hierarchical Trace Map. ICSME 2019: 367-369 - [c31]Diyu Wu, Jie Liu, Yulei Sui, Shiping Chen, Jingling Xue:
Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android. ICST 2019: 276-287 - [c30]Changwei Zou, Yulei Sui, Hua Yan, Jingling Xue:
TCD: Statically Detecting Type Confusion Errors in C++ Programs. ISSRE 2019: 292-302 - [c29]Yao Wan, Jingdong Shu, Yulei Sui, Guandong Xu, Zhou Zhao, Jian Wu, Philip S. Yu:
Multi-modal Attention Network Learning for Semantic Source Code Retrieval. ASE 2019: 13-25 - [c28]Yuxiang Lei, Yulei Sui:
Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis. SAS 2019: 27-47 - [c27]Hua Yan, Shiping Chen, Yulei Sui, Yueqian Zhang, Changwei Zou, Jingling Xue:
Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis. SAS 2019: 48-72 - [c26]Yulei Sui, Yifei Zhang, Wei Zheng, Manqing Zhang, Jingling Xue:
Event trace reduction for effective bug replay of Android apps via differential GUI state analysis. ESEC/SIGSOFT FSE 2019: 1095-1099 - [i2]Yao Wan, Jingdong Shu, Yulei Sui, Guandong Xu, Zhou Zhao, Jian Wu, Philip S. Yu:
Multi-Modal Attention Network Learning for Semantic Source Code Retrieval. CoRR abs/1909.13516 (2019) - 2018
- [j6]Zhengxiong Hou, Yunlan Wang, Yulei Sui, Jianhua Gu, Tianhai Zhao, Xingshe Zhou:
Managing high-performance computing applications as an on-demand service on federated clouds. Comput. Electr. Eng. 67: 579-595 (2018) - [j5]Yulei Sui, Hua Yan, Zheng Zheng, Yunpeng Zhang, Jingling Xue:
Parallel construction of interprocedural memory SSA form. J. Syst. Softw. 146: 186-195 (2018) - [j4]Yulei Sui, Xiaokang Fan, Hao Zhou, Jingling Xue:
Loop-Oriented Pointer Analysis for Automatic SIMD Vectorization. ACM Trans. Embed. Comput. Syst. 17(2): 56:1-56:31 (2018) - [c25]Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue:
Live Path CFI Against Control Flow Hijacking Attacks. ACISP 2018: 768-779 - [c24]Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue:
Live path control flow integrity. ICSE (Companion Volume) 2018: 195-196 - [c23]Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue:
Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities. ICSE 2018: 327-337 - [c22]Yifei Zhang, Yulei Sui, Jingling Xue:
Launch-mode-aware context-sensitive activity transition analysis. ICSE 2018: 598-608 - [c21]Qing Gao, Sen Ma, Sihao Shao, Yulei Sui, Guoliang Zhao, Luyao Ma, Xiao Ma, Fuyao Duan, Xiao Deng, Shikun Zhang, Xianglong Chen:
CoBOT: static C/C++ bug detection in the presence of incomplete code. ICPC 2018: 385-388 - [c20]Mehdi Nobakht, Yulei Sui, Aruna Seneviratne, Wen Hu:
Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks. TrustCom/BigDataSE 2018: 533-538 - 2017
- [c19]Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue:
Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. ACSAC 2017: 42-54 - [c18]Xiaokang Fan, Yulei Sui, Xiangke Liao, Jingling Xue:
Boosting the precision of virtual call integrity protection with partial pointer analysis for C++. ISSTA 2017: 329-340 - [c17]Jieyuan Zhang, Yulei Sui, Jingling Xue:
Incremental Analysis for Probabilistic Programs. SAS 2017: 450-472 - [i1]Yulei Sui, Jingling Xue:
Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement. CoRR abs/1701.05650 (2017) - 2016
- [j3]Yulei Sui, Ding Ye, Yu Su, Jingling Xue:
Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions. IEEE Trans. Reliab. 65(4): 1682-1699 (2016) - [c16]Yulei Sui, Jingling Xue:
SVF: interprocedural static value-flow analysis in LLVM. CC 2016: 265-266 - [c15]Yulei Sui, Peng Di, Jingling Xue:
Sparse flow-sensitive pointer analysis for multithreaded programs. CGO 2016: 160-170 - [c14]Yulei Sui, Xiaokang Fan, Hao Zhou, Jingling Xue:
Loop-oriented array- and field-sensitive pointer analysis for automatic SIMD vectorization. LCTES 2016: 41-51 - [c13]Peng Di, Yulei Sui:
Accelerating Dynamic Data Race Detection Using Static Thread Interference Analysis. PMAM@PPoPP 2016: 30-39 - [c12]Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue:
Automated memory leak fixing on value-flow slices for C programs. SAC 2016: 1386-1393 - [c11]Yulei Sui, Jingling Xue:
On-demand strong update analysis via value-flow refinement. SIGSOFT FSE 2016: 460-473 - 2015
- [c10]Xiaokang Fan, Yulei Sui, Jingling Xue:
Contention-Aware Scheduling for Asymmetric Multicore Processors. ICPADS 2015: 742-751 - [c9]Peng Di, Yulei Sui, Ding Ye, Jingling Xue:
Region-Based May-Happen-in-Parallel Analysis for C Programs. ICPP 2015: 889-898 - 2014
- [b1]Yulei Sui:
Developing practical pointer analysis for large-scale software. University of New South Wales, Sydney, Australia, 2014 - [j2]Yulei Sui, Sen Ye, Jingling Xue, Jie Zhang:
Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation. Softw. Pract. Exp. 44(12): 1485-1510 (2014) - [j1]Yulei Sui, Ding Ye, Jingling Xue:
Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis. IEEE Trans. Software Eng. 40(2): 107-122 (2014) - [c8]Ding Ye, Yulei Sui, Jingling Xue:
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis. CGO 2014: 154 - [c7]Yue Li, Tian Tan, Yulei Sui, Jingling Xue:
Self-inferencing Reflection Resolution for Java. ECOOP 2014: 27-53 - [c6]Ding Ye, Yu Su, Yulei Sui, Jingling Xue:
WPBOUND: Enforcing Spatial Memory Safety Efficiently at Runtime with Weakest Preconditions. ISSRE 2014: 88-99 - [c5]Sen Ye, Yulei Sui, Jingling Xue:
Region-Based Selective Flow-Sensitive Pointer Analysis. SAS 2014: 319-336 - 2013
- [c4]Yulei Sui, Yue Li, Jingling Xue:
Query-directed adaptive heap cloning for optimizing compilers. CGO 2013: 1:1-1:11 - 2012
- [c3]Peng Di, Ding Ye, Yu Su, Yulei Sui, Jingling Xue:
Automatic Parallelization of Tiled Loop Nests with Enhanced Fine-Grained Parallelism on GPUs. ICPP 2012: 350-359 - [c2]Yulei Sui, Ding Ye, Jingling Xue:
Static memory leak detection using full-sparse value-flow analysis. ISSTA 2012: 254-264 - 2011
- [c1]Yulei Sui, Sen Ye, Jingling Xue, Pen-Chung Yew:
SPAS: Scalable Path-Sensitive Pointer Analysis on Full-Sparse SSA. APLAS 2011: 155-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint